Security Innovation is proud to be a National Cybersecurity Awareness Month Champion, dedicated to helping make companies more secure from administrators and developers to IT Security Managers and CISOs.
Despite there being a defensive coding best practice that mitigates the risk of a buffer overflow occurring in any of these architectures, developers are STILL writing code that allows untrustworthy input to compromise application memory. How do we stop this cycle or are we doomed to repeat the security mistakes of the past?
Read our latest blog post to get our expert's take.
Everyone loses data at some point in their lives. Your computer’s hard drive could fail tomorrow, ransomware could hold your files hostage, or a software bug could delete your important files. If you’re not regularly backing up your computer, you could lose those files forever.
Using our handy infographic, learn the best way to back up your Mac or PC safely.
With the prevalence of malware and other viruses, achieving good computer security can seem like a daunting task. Fortunately, following the few simple steps outlined in our handy checklist can help keep your computer's security tight.
Despite the estimated number of unfilled cybersecurity positions worldwide - over 1 million by some counts - women represent a mere 11% of the industry. That means that we missing out on almost half of the population’s talent pool, during a period in history when cyber crime poses one of the most menacing threats to our society.
Security Innovation is committed to helping bridge the gender gap in the industry, supporting groups like WISP and others. But most importantly, we support women in cybersecurity in our offices! Hear from a few of our female engineers as to why they got into the field, what challenges they face and how they think we can attract more women to cybersecurity.
In today’s busy, automated world people are finding themselves using touchscreen kiosks everywhere - from restaurants to the airport. But don’t be fooled, these machines are just big computers, with the ability to become compromised. Check out our top safety tips when using kiosks in this easy-to-follow infographic.
Applications are the primary target of attack due to their prevalence and inherent exposure, and require a solid defense in depth strategy to reduce risk. This webinar will educate IT and development teams on technologies available to build and deploy more secure software systems and debunks common myths about what each can and cannot protect.